University of Hull

Displaying 1-5 of 5 results

  • White Papers // Sep 2013

    An Automated Network Security Checking and Alert System: A New Framework

    Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open...

    Provided By University of Hull

  • White Papers // Dec 2012

    CRT Based Threshold Multi Secret Sharing Scheme

    In this paper, the authors present a novel secret sharing system that is based on Chinese remainder theorem. This scheme deals with a concept of multiple secrets to be shared to different groups, such that each group receives shares of secret intended for it. The sharing is a threshold scheme...

    Provided By University of Hull

  • White Papers // Jan 2012

    Software Failure Analysis at Architecture Level Using FMEA

    The advancement and proliferation of information technology has made it possible for specified functions of systems including safety-critical systems to be software driven. Traditional failure analysis techniques existed before computers and are widely used in the failure analysis of hardware. Typically, hardware failures are random while software failures are systematic...

    Provided By University of Hull

  • White Papers // Jul 2011

    Disability-Aware Software Engineering for Improved System Accessibility and Usability

    In developing software systems, software engineers use software development life cycles such as the waterfall, prototyping or spiral model. Whilst these life cycles ensure that the system meets the needs of people without disabilities, the needs of people with disabilities are often overlooked thus resulting in systems that are inaccessible...

    Provided By University of Hull

  • White Papers // Oct 2010

    A Plant Documentation Information System Design

    Traditional systems do not have the descriptive ability to represent the complex, multi-faceted nature of complex documentation structures such as engineering systems descriptions. This has led to significant information management difficulties in maintaining documentation which reflects, in a consistent and up-to-date way, the current state of the documentation systems. The...

    Provided By University of Hull

  • White Papers // Dec 2012

    CRT Based Threshold Multi Secret Sharing Scheme

    In this paper, the authors present a novel secret sharing system that is based on Chinese remainder theorem. This scheme deals with a concept of multiple secrets to be shared to different groups, such that each group receives shares of secret intended for it. The sharing is a threshold scheme...

    Provided By University of Hull

  • White Papers // Sep 2013

    An Automated Network Security Checking and Alert System: A New Framework

    Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open...

    Provided By University of Hull

  • White Papers // Oct 2010

    A Plant Documentation Information System Design

    Traditional systems do not have the descriptive ability to represent the complex, multi-faceted nature of complex documentation structures such as engineering systems descriptions. This has led to significant information management difficulties in maintaining documentation which reflects, in a consistent and up-to-date way, the current state of the documentation systems. The...

    Provided By University of Hull

  • White Papers // Jul 2011

    Disability-Aware Software Engineering for Improved System Accessibility and Usability

    In developing software systems, software engineers use software development life cycles such as the waterfall, prototyping or spiral model. Whilst these life cycles ensure that the system meets the needs of people without disabilities, the needs of people with disabilities are often overlooked thus resulting in systems that are inaccessible...

    Provided By University of Hull

  • White Papers // Jan 2012

    Software Failure Analysis at Architecture Level Using FMEA

    The advancement and proliferation of information technology has made it possible for specified functions of systems including safety-critical systems to be software driven. Traditional failure analysis techniques existed before computers and are widely used in the failure analysis of hardware. Typically, hardware failures are random while software failures are systematic...

    Provided By University of Hull